1 |
Kazuomi Oishi, 'Unconditionally Anonymous Public-key Certificates and their Applicstions,' Master thesis, August, 1999
|
2 |
Andy Oram, 'PEER- to- PEER,' O'Relly. 2001
|
3 |
김봉한, 임명현, 임재명, 이재광, 'P2P(Peer to peer) 환경에서의 정보보호 위협과 정보보호 서비스,' 정보보호학회지, 제12권 5호, 2002
과학기술학회마을
|
4 |
전현성, 조용중, 박천구, '세상을 바꾸는 힘의 중심 P2P,' 프로그램 세계, 2002
|
5 |
Dreamtech Software Team, 'Peer-to-Peer Application Development : Cracking the Code,' John Wiley & Sons, 2001
|
6 |
Yulian Wang, 'SPKI,' Network Security, 1998
|
7 |
Takamichi SAlTO, Kentaro UMESAWA, Hiroshi G. OKUNO, 'Privacy Enhanced Access Control by SPKI,' lEEE, 2000
DOI
|
8 |
C. Ellision, B. Frantz, B.Lampson, R. Rivest, B.Thomas, T. Ylonen, 'SPKI Certificate Theory,' RFC 2693, September 1999
|
9 |
Dejan S.Milojicic, Vana Kalogeraki, Rajan Lukosc. Kiran Nagaraja. Jim Pruyne, Bruno Richard, Sami Rollins, Zhichen Xu, 'Peer to Peer Computing,' Hewlett Packard Company. 2002
|